ARTICLES

From Voice Authentication to Enhanced Voice Authentication

The adaptation of voice authentication for enterprises has evolved to enhanced voice authentication. Read on to know more about the latest voice authentication technology... In...

4 Lakh Cyber Attacks on India from 5 Nations

India has been a target of 4.3 cyber-attacks from several countries. Read on to know more about the latest findings of a security firm... According...

How WP GDPR Compliance Plugin was Compromised

Recently, WordPress GDPR Plugin was exploited by the hackers and all WP sites using this plugin was vulnerable. Read on to know more about...

All About HSBC Bank Data Breach

Recently, financial data of several customers of HSBC Bank in U.S. was compromised in an apparent data breach. Read on to know more about...

NEWS

Mylobot botnet found delivering Khalesi malware in a new campaign

Source: Cyware | By Sophia Brown • Mylobot is considered to be a sophisticated downloader that uses advances anti-analysis techniques to evade detection. • Experts discovered...

Skybox Founder and CEO’s India Trip Reaffirms APAC Focus

Skybox Security, a cybersecurity management firm has emphasized its focus on India. Skybox Security CEO and Founder Gidi Cohen is in India to strengthen...

Cyberbit launches SCADAScan

Cyberbit launches SCADAScan, first portable Industrial Control network security assessment solution Cyberbit announced the launch of SCADAScan, the first portable ICS/SCADA network assessment system. SCADAScan...

Fortinet Positioned as Challenger in Gartner’s First Quadrant

Fortinet Positioned as Challenger in Gartner's First Quadrant for WAN Edge Infrastructure Fortinet announced their inclusion in Gartner's first Magic Quadrant for WAN Edge Infrastructure...

INTERVIEWS

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...